Information Security Today Home

New Books on Cloud Security

Developing and Securing the Cloud by Bhavani Thuraisingham; ISBN 9781439862919
Securing Cloud and Mobility: A Practitioner's Guide by Ian Lim, E. Coleen Coolidge, and Paul Hourani; ISBN 9781439850558
Cloud Computing: Implementation, Management, and Security by John W. Rittinghouse and James F. Ransome; ISBN 9781439806807
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud by Frank Siepmann; ISBN 9781439879092
Core Software Security: Security at the Source by James Ransome and Anmol Misra; ISBN 9781466560956
The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture by Kerry Ann Anderson; ISBN 9781482220070

Sophos Security Threat Trends and Predictions 2015 Report

By James Lyne, Global Head of Security Research, Sophos

It's that time of year and today Sophos released its 2015 security predictions report. The Security Threat Trends 2015 shares the ten big things Sophos experts believe will have a significant impact on cyber security in 2015 and beyond. Please view the full report for context, however, it examines the following:

  1. Exploit mitigations reduce the number of useful vulnerabilities.
  2. Internet of Things attacks move from proof-of-concept to mainstream risks.
  3. Encryption becomes standard, but not everyone is happy about it.
  4. More major flaws in widely-used software that had escaped notice by the security industry over the past 15 years.
  5. Regulatory landscape forces greater disclosure and liability, particularly in Europe.
  6. Attackers increase focus on mobile payment systems, but stick more to traditional payment fraud for a while.
  7. Global skills gap continues to increase, with incident response and education a key focus.
  8. Attack services and exploit kits arise for mobile (and other) platforms.
  9. The gap between ICS/SCADA and real world security only grows bigger.
  10. Interesting rootkit and bot capabilities may turn up new attack vectors.

 
Subscribe to Information Security Today






Share This Article

Bookmark and Share


© Copyright 2014 Auerbach Publications